Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles

This paper describes an incentive scheme for promoting the cooperation, and, therefore, avoiding selfish behaviours, in Delay Tolerant Networks (DTN) by rewarding participant nodes with cryptographic keys that will be required for sending bundles. DTN are normally sparse, and there are few opportunistic contacts, so forwarding of other's bundles can be left out. Moreover, it is difficult to determine the responsible nodes in case of bundle loss. The mechanism proposed in this paper contributes to both problems at the same time. On one hand, cryptographic receipts are generated using time-limited Identity Based Cryptography (IBC) keys to keep track of bundle transmissions. On the other hand, these receipts are used to reward altruistic behaviour by providing newer IBC keys. Finally, these nodes need these IBC keys to send their own bundles. When all nodes behave in a cooperative way, this incentive scheme works as a virtuous circle and achieves a Nash equilibrium, improving very much the network performance in terms of latency. The scheme is not difficult to implement, and it can use an already existing IBC infrastructure used for other purposes in a DTN.

[1]  Ying Li,et al.  Fair Exchange Signature Schemes , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[2]  Levente Buttyán,et al.  Barter trade improves message delivery in opportunistic networks , 2010, Ad Hoc Networks.

[3]  Songwu Lu,et al.  Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2012, IEEE Trans. Veh. Technol..

[4]  Carlos Borrego,et al.  A store-carry-process-and-forward paradigm for intelligent sensor grids , 2013, Inf. Sci..

[5]  Srinivasan Keshav,et al.  Low-cost communication for rural internet kiosks using mechanical backhaul , 2006, MobiCom '06.

[6]  J. Harsanyi Rational Behaviour and Bargaining Equilibrium in Games and Social Situations , 1977 .

[7]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[10]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[11]  Jörg Ott,et al.  Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.

[12]  Noam Nisan,et al.  Algorithms for Selfish Agents , 1999, STACS.

[13]  Stephen Farrell,et al.  Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.

[14]  Kevin C. Almeroth,et al.  Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks , 2008, IEEE Transactions on Mobile Computing.

[15]  Chaki Ng,et al.  Mirage: a microeconomic resource allocation system for sensornet testbeds , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..

[16]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[17]  Levente Buttyán,et al.  Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[18]  Scott C. Burleigh,et al.  Bundle Protocol Specification , 2007, RFC.

[19]  William P. Marnane,et al.  Identity- Based Cryptography , 2008 .

[20]  Jianying Zhou,et al.  An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..

[21]  M. Joye,et al.  Identity-Based Cryptography - Volume 2 Cryptology and Information Security Series , 2008 .

[22]  P. Gács,et al.  Algorithms , 1992 .

[23]  R. Srikant,et al.  Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.

[24]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[25]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[26]  Christos H. Papadimitriou,et al.  Algorithms, games, and the internet , 2001, STOC '01.

[27]  Noam Nisan,et al.  Algorithms for selfish agents mechanism design for distributed computation , 1999 .

[28]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[29]  Olivier Markowitch,et al.  Probabilistic Non-Repudiation without Trusted Third Party , 1999 .

[30]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[31]  Bobby Bhattacharjee,et al.  Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.

[32]  Kyung Sup Kwak,et al.  Fair exchange signature schemes , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[33]  Qinghua Li,et al.  Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.

[34]  Margo I. Seltzer,et al.  Isolation with Flexibility: A Resource Management Framework for Central Servers , 2000, USENIX Annual Technical Conference, General Track.

[35]  Xiaodong Lin,et al.  Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.

[36]  Jeff Chase,et al.  Self-recharging virtual currency , 2005, P2PECON '05.

[37]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[38]  Tim Roughgarden,et al.  How bad is selfish routing? , 2002, JACM.

[39]  Zhili Sun,et al.  Routing in Delay/Disruption Tolerant Networks: A Taxonomy, Survey and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[40]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .